TI中文支持网
TI专业的中文技术问题咨询交流网站

cc2642R 的AESECB加解密的问题,这个与cc2640r2f里面的AESECB加解密算出来的是一样吗?如果KEY相同。

如题,在cc2642R AESCBC.c中,我看到加解密的算法与cc2640r2f里面的AESECB加解密算法有些差异,这两种算法算出来的是一样吗?能互相加解密吗?因为以前的手机APP的算法是使用cc2640r2f的算法。

Viki Shi:

CC26X2上有AES的硬件模块

Enhanced Security
With additional hardware security accelerators for AES-128/256, SHA-256, and ECC, CC26x2 saves five times the processing time and current consumption for implementing security algorithms. This is critical to enable strong network security.

user5203601:

回复 Viki Shi:

设备跟APP应用必须使用单独的蓝牙通讯加解密,只能使用硬件的AES,不能使用软件的AESECB吗?

Viki Shi:

回复 user5203601:

软件安全性能是基于协议栈的,硬件安全性能比较全面
Security Core
The security core of the CC13x2 and CC26x2 device platform features an Advanced Encryption Standard
(AES) module with 256-bit key support, local key storage and DMA capability. It also includes a Hash
engine (SHA-2) and a Public Key Acceleration (PKA) engine.
Features of the AES engine are as follows:
• ECB, CBC, CBC-MAC, CTR, CCM, and GCM modes of operation
• 118-Mbps throughput
• Secure key storage memory
• Low latency
• SHA-224, SHA-256, SHA-384, and SHA-512
• Hardware accelerators for elliptic curve calculations

具体内容请参考:www.ti.com/…/swcu185d.pdf

user5203601:

回复 Viki Shi:

AESECB_init();handle = AESECB_open(0, NULL);if (handle == NULL) {ScUARTPrintf("communicate_init AESCBC_open fail! \r\n");return;}CryptoKeyPlaintext_initKey(&cryptoKey1, keyingMaterial, sizeof(keyingMaterial));AESECB_Operation operation;AESECB_Operation_init(&operation);
为什么 AESECB_open失败,返回为NULL?这个代码是参考例程的,有问题吗?

Viki Shi:

回复 user5203601:

请看一下这边的回复:e2e.ti.com/…/3068233

赞(0)
未经允许不得转载:TI中文支持网 » cc2642R 的AESECB加解密的问题,这个与cc2640r2f里面的AESECB加解密算出来的是一样吗?如果KEY相同。
分享到: 更多 (0)